OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption , September 2001
(см.
http://www.cs.ucdavis.edu/~rogaway
).
84. RSA Laboratories.
PKCS #1 v2.1: RSA Cryptography Standard , January
2001 (см.
http://www.rsasecurity.com/rsalabs/pkcs
).
85. Schneier B., Kelsey J., Whiting D., Wagner D., Hall C., Ferguson N.
The Twofish Encryption Algorithm, A 128-bit Block Cipher. ? Wiley, 1999.
86. Schneier B.
Applied Cryptography, Protocols, Algorithms, and Source Code in C. ? John Wiley & Sons, Inc., 1994 (ISBN 0-471-59756-2).
87. Schneier B.
Applied Cryptography, Second Edition, Protocols, Algorithms, and Source Code in C. ? John Wiley & Sons, Inc., 1996; ISBN 0-471-12845-7.
(Шнайер Б.
Прикладная криптография, 2-е издание: протоколы, алго- ритмы, исходные тексты на языке Си. ? М. : Триумф, 2002.)
88. Schneier B.
Secrets and Lies, Digital Security in a Networked World. ?
John Wiley & Sons, Inc., 2000. ISBN 0-471-25311-1. (Шнайер Б.
Секреты и ложь. Безопасность данных в цифровом мире. ? СПб. : Питер, 2003.)
89. Dr. Seuss.
Horton Hears a Who! ? Random House, 1954.
90. Shannon C.E.
A Mathematical Theory of Communication // The Bell Sys-
tems Technical Journal. — 1948. — 27. — Р. 370–423; 623–656 (см.
http:
//cm.bell-labs.com/cm/ms/what/shannonday/paper.html
).
91. Wagner D., Ferguson N. and Schneier B.
Cryptanalysis of FROG. ? In:
Proc. 2nd AES candidate conference . National Institute of Standards and
Technology, March 1999, p. 175–181.
92. Wagner D. and Schneier B.
Analysis of the SSL 3.0 protocol. ? In:
Proc. of the Second USENIX Workshop on Electronic Commerce . USENIX Press,
November 1996, p. 29–40 (исправленный вариант см. на
http://www.
counterpane.com
).
93. Whiting D., Housley R. and Ferguson N.
Counter with CBC-MAC (CCM) , June 2002 (см.
http://csrc.nist.gov/encryption/modes/
proposedmodes/ccm/ccm.pdf
).
94. Wiener M.J.
Cryptanalysis of short RSA secret exponents // IEEE Trans-
actions on Information Theory. — 1990. — 36(3). — Р. 553–558.
95. Winternitz R.S.
Producing a One-way Hash Function from DES. ? In:
Chaum D. (ed).
Advances in Cryptology, Proceedings of Crypto 83 . Plenum
Press, 1983, p. 203–207.
96. Wu T.
The Secure Remote Password Protocol. ? In:
Proc. of the 1998 Net- work and Distributed System Security (NDSS ’98) Symposium , March 1998.
Предметный указатель
A
Access Control List (ACL),
350 Advanced Encryption Standard (AES),
74 ASN.1,
276 B
Boojum,
164 C
CBC-MAC,
120 Certificate Authority (CA),
47 ;
337 Certificate Revocation List (CRL),
356 Chinese Remainder Theorem (CRT),
246 Cipher Block Chaining (CBC),
90 D
Data Encryption Standard (DES),
71 Dynamic RAM (DRAM),
163 E
Electronic Codebook (ECB),
89 European Committee for Standardization
(CEN),
388 H
HMAC,
122 I
Institute of Electrical and Electronics
Engineers (IEEE),
388 International Organization for
Standardization (ISO),